Compatibility

ENDPOINT SECURITY

Remote access to your networks from wireless devices, such as smartphones, tablets and personal laptops, can create pathways for security threats. How are you doing with the following endpoint security measures?

Personal Devices

Policies are in place for employees who use personal devices for work to prevent data loss, and those devices have updated security software.

No

Not Sure

Yes

Firewalls

Our network security and firewall systems are regularly updated and monitored to ensure the latest and greatest defenses are in place to protect against internet-based cyber threats.

No

Not Sure

Yes

Monitoring

Our systems are monitored 24/7 to ensure critical updates are applied, maintenance is performed and dedicated IT personnel are addressing emerging threats related to cloud-based security protection.

No

Not Sure

Yes

PRINTER SECURITY

Modern printers and copiers are connected to networks and have the ability to email, scan, fax, store data and, yes, even print! They need to be protected just as much as computers. How does your organization rate?

Printed Documents

We have a policy in place to ensure that confidential printed documents don’t end up in the wrong hands.

No

Not Sure

Yes

Rules-based Printing

We have PIN-access or swipe-to-print protection measures in place to release print jobs only when an authorized user is present to retrieve printed documents.

No

Not Sure

Yes

Security Settings

Job tracking, hard drive encryption, password protection, remote monitoring and proper network configurations are in place and are routinely updated.

No

Not Sure

Yes

BACK-UP SYSTEMS

Even when robust security measures are in place, there’s no 100% guarantee. Systems may be compromised through employee error, malfunction or natural disaster. How would you rank your ability to restore data?